843 research outputs found

    TOWARDS A COHERENT PERSPECTIVE: A LITERATURE REVIEW ON THE INTERPLAY OF THE INTERNET OF THINGS AND ECOSYSTEMS

    Get PDF
    The success of the IoT is inextricably linked to the balanced interplay of technological, organisational and economical interdependencies that occur in the cyber physical IoT ecosystem. De-spite growing scientific interest, recent literature lags behind cumulativeness and focuses on individual constitutions of the IoT rather than on a comprehensive and coherent understanding. To better position the IoT as a whole - that is more than the sum of its parts - we take an ecosystemic perspective on the phenome and systematically identify and analyse a collection of 70 relevant publications on the IoT ecosystem. We intend to give the first comprehensive overview of the ecosystem construct in the IoT, including a systematization of the existing literature and thus contribute to the synthesis of prior fragmented literature. Drawing on an ecosystem view we aim to reveal research avenues for the IS community that none of the IoT’ s individual constitutions can provid

    Runtime Configuration Validation for Self-configurable Systems

    Get PDF
    International audienceRuntime configuration validation is a critical requirement if we are to build reliable self-adaptive systems. This paper describes a model-based approach that supports runtime validation of candidate configurations. The approach is based on MeCSV, a metamodel we propose, that allows a technologyneutral specification of systems' configurations and validity constraints. A constraint-checker relying on this specification verifies dynamically candidate configurations before their deployment. Experimental results with a messaging platform show viable validation overhead demonstrating the feasibility of the approach

    Provisioning of Service Mashup Topologies

    Get PDF

    Integrating an Online Configuration Checker with Existing Management Systems : Application to CIM/WBEM Environments

    Get PDF
    National audienceRuntime configuration validation is a critical requirement if we are to build reliable self-adaptive management systems. This paper presents a generic framework that includes a runtime configuration checker built upon a high-level language dedicated to the specification of configurations and validity constraints. In addition, we describe a methodology for using this framework and integrating the configuration checker with existing management systems. In particular, we show how we use the framework to enrich a CIM/WBEM management environment with automatic runtime configuration validation against a defined set of constraints guarding structural correctness and service behavior conformance. Our experiments with management models conforming to the CIM Virtual System profile show viable results demonstrating the feasibility of our approach

    Automated AMF Configuration Difference Generation

    Get PDF
    Many domains require computer clusters to meet clients’ service level expectations. As cluster size increases, component failure becomes more likely. Rapid failure recovery is required to maintain high availability. The SA Forum has created specifications enabling management of multi-vendor solutions. These long-lived systems require tailored upgrade campaigns to keep their configuration up-to-date. Passed works on SA Forum’s Availability Management Framework (AMF) have created an automated AMF configuration generator and upgrade campaign generator. However, to generate an upgrade campaign for an already configured cluster based on a new target configuration, a configuration difference generator is needed. Furthermore, while Distinguished Names (DNs) usually uniquely identify object in a configuration, configuration generators do not guarantee that DNs in the new configuration will match. DN modification is not possible in a system without object replacement, causing service loss. Non-DN based inter-configuration object association is needed to restore old DNs. Our objective is to devise a technique to perform difference generation with limited knowledge of DNs and to find what data is needed to achieve this. To accomplish this, we analyse the AMF configuration model, then propose assumptions in a top down approach based on maintaining service availability during upgrade. We propose a two phase technique that first associates objects in-between configurations and then outputs the differences. We have implemented a tool that implements this technique on the Eclipse Platform and integrates with MAGIC’s Automated Upgrade Campaign Generator. We then present a case study based on the PHASE example

    Evaluation of Frame- and Feature-based Software Product Line Tools from the Viewpoint of Mass Customization by End Users

    Get PDF
    Customers expect Information and Communications Technology (ICT) platforms and applications to deliver services customized to their needs. Software product line (SPL) paradigm uses platforms and variability management to develop mass-customizable software applications. The paradigm necessitates effective software tools to manage platform and application artifacts and traceability and variability information. This paper constructs a comprehensive but lightweight tool evaluation framework and uses it to evaluate two tools, XML-based variant configuration language (XVCL) and FeaturePlugin – a feature modeling plug-in for Eclipse Integrated Development Environment. The paper analyzes the capabilities of the tools for enabling the mass customization of software applications by the end users performing complex workflows. Both the XVCL and FeaturePlugin tool envisage more efficient software system development by means of reusability, support for abstraction, and configuration mechanisms. Future research is needed to refine and validate the evaluation framework in the context of other types of SPL tools

    Generic and adaptable online configuration verification for complex networked systems

    Get PDF
    International audienceDynamic reconfiguration is viewed as a promising solution for today's complex networked systems. However, considering the critical missions actual systems support, systematic dynamic reconfiguration cannot be achieved unless the accuracy and the safety of reconfiguration activities are guaranteed. In this paper, we describe a model-based approach for runtime configuration verification. Our approach uses model-driven engineering techniques to implement a platform-independent online configuration verification framework that can operate as a lightweight extension for networked systems management solutions. The framework includes a flexible and adaptable runtime verification service built upon a high-level language dedicated to the rigorous specification of configuration models and constraints guarding structural correctness and service behavior conformance. Experimental results with a real-life messaging platform show viable overhead demonstrating the feasibility of our approach

    Modeling of Configurations for Embedded System Implementations in MARTE

    Get PDF
    International audienceThis paper deals with aspects related to modeling of system configurations, which are very useful for describing various states of an embedded system, from both structural and operational viewpoints. We discuss in detail the current proposition of the UML MARTE profile via some examples, and point out some limitations of the current proposition, mainly concerning the semantic aspects of the defined concepts. In order to draw answering elements, we report our experiences about the modeling of implementations and execution modes in Systemson- Chip, within the Gaspard2 SoC co-design framework

    Interplay of Security&Dependability and Resource using Model-driven and Pattern-based Development

    Get PDF
    International audienceSeveral frameworks have been proposed to help designers of embedded system applications. However, we currently lack methodological tool support to take into account the interplay between security&;dependability and resource properties. In this work, we propose a modeling environment which associates model-driven paradigms with security and dependability patterns to ensure that the combination of security and dependability solutions fit on the targeted hardware platform. The resulted framework will serve as a tool to estimate the resources consumed by the security and dependability solutions at early stages of design to help the designer to avoid resource conflicts at run-time. In addition, we provide an architecture for development tools to support the design and the analysis of pattern-based secure and dependable applications. Finally, we apply it in practice to a use case from railway domain with strong security and dependability requirements

    Rapport de prospective sur l'interopérabilité dans le monde du Cloud et du SaaS

    Get PDF
    Ce document présente une solution pour la configuration et le déploiement d'applications dans un environnement de cloud computing. La solution permet de : (1) découpler l'applicatif à déployer de l'environnement dans lequel il sera déployer, (2) spécifier les besoins de l'applicatif nécessaires à son bon déploiement, (3) spécifier les caractéristiques des offres d'hébergement, (4) permettre le calcul de la correspondance entre les besoins et les offres d'hébergement, (5) générer le script qui permet de déployer un applicatif sur une offre d'hébergement. Cette solution est mise en oeuvre dans l'outil Saloon dont les fonctionnalités sont présentées dans ce livrable. Saloon utilise des techniques de lignes de produits logiciels, d'ontologies et de modèles de caractéristiques pour atteindre les cinq objectifs énoncés ci-dessus
    • …
    corecore